f:\Project\MTK_Download_tool\V1.1(1140) for huawei\FPMultiDownLoad\release\MuitiDownLoad.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-27_d6296bc2cfbdbd2eea5c0b4ad940a190_icedid.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-03-27_d6296bc2cfbdbd2eea5c0b4ad940a190_icedid.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-27_d6296bc2cfbdbd2eea5c0b4ad940a190_icedid
-
Size
512KB
-
MD5
d6296bc2cfbdbd2eea5c0b4ad940a190
-
SHA1
ab647634d3d5599c25e361f6a9c0297b2bc951cb
-
SHA256
580e9370b4bcfd64094582ded677efa018064302010afd26b6204e918e3aa6c4
-
SHA512
fcf5720a8e693287bd827ec7092264f64df7ef106a071fe7a7a83a1ca01b4f78c05b13887fb737ed38def69de24ea28cc3a572b2db960041b70c6cda90206b89
-
SSDEEP
12288:b5kFlE/4/19WAlHyAFkfJNB26r9iYPrRn3oO0iOxJD0:bvAlQr9iYlh0tXQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-27_d6296bc2cfbdbd2eea5c0b4ad940a190_icedid
Files
-
2024-03-27_d6296bc2cfbdbd2eea5c0b4ad940a190_icedid.exe windows:4 windows x86 arch:x86
135c871ce7a13fbaf7b1b5bc4f271ee7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
InterlockedIncrement
GetCurrentDirectoryA
GlobalFlags
GetCPInfo
GetOEMCP
SetErrorMode
GetTickCount
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
HeapSize
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetStartupInfoA
SetStdHandle
GetFileType
RtlUnwind
RaiseException
ExitThread
GlobalHandle
GetACP
GetTimeZoneInformation
GetStdHandle
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetStringTypeA
GetStringTypeW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GlobalReAlloc
TlsGetValue
LocalAlloc
GetFileTime
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetThreadLocale
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
FindFirstFileA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
FindClose
InterlockedDecrement
GetModuleFileNameW
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetCurrentProcessId
GlobalAddAtomA
CreateEventA
SuspendThread
SetEvent
ResumeThread
SetThreadPriority
FreeResource
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FreeLibrary
GlobalDeleteAtom
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
MulDiv
HeapFree
HeapAlloc
HeapReAlloc
EnterCriticalSection
GetProcessHeap
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
GetVersion
CompareStringA
InterlockedExchange
lstrlenW
MultiByteToWideChar
CompareStringW
lstrlenA
GetPrivateProfileStringA
RemoveDirectoryA
DeleteFileA
SetFileAttributesA
GetCurrentThreadId
ReadFile
GetFileSize
GetProcAddress
GetModuleHandleA
LoadLibraryA
SetLastError
WritePrivateProfileStringA
CloseHandle
WaitForSingleObject
GetPrivateProfileIntA
CreateProcessA
Sleep
GetTempPathA
GetFileAttributesA
GetModuleFileNameA
GetLastError
CreateMutexA
FindResourceA
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
CreateFileA
CreateThread
GetSystemDirectoryA
user32
SetRect
InvalidateRect
InvalidateRgn
GetNextDlgGroupItem
MessageBeep
UnregisterClassA
RegisterClipboardFormatA
PostThreadMessageA
IsDialogMessageA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
UpdateWindow
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
EqualRect
IsRectEmpty
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetLastActivePopup
SetWindowsHookExA
CallNextHookEx
GetMessageA
DispatchMessageA
PeekMessageA
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetSysColor
EndPaint
BeginPaint
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
CopyRect
GetDesktopWindow
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetWindowLongA
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindow
SetWindowContextHelpId
GetParent
MapDialogRect
SetWindowPos
PostQuitMessage
CharUpperA
EnableWindow
LoadCursorA
SetCursor
PtInRect
ScreenToClient
GetCursorPos
GetFocus
CopyAcceleratorTableA
CharNextA
ReleaseCapture
SetCapture
GetSysColorBrush
GetKeyState
SwitchToThisWindow
DestroyMenu
MoveWindow
BringWindowToTop
SetForegroundWindow
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
IsWindowEnabled
GetMenuItemCount
GetMenuState
KillTimer
SetTimer
ShowWindow
SetWindowLongA
EnumThreadWindows
WaitForInputIdle
SendMessageA
GetClassNameW
EnumChildWindows
IsWindowVisible
GetClassNameA
IsWindow
MessageBoxA
SetWindowTextA
PostMessageA
GetMenuItemID
GetSubMenu
GetMenu
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
LoadImageA
SetCursorPos
GetWindowRect
LoadIconA
TranslateMessage
gdi32
ExtSelectClipRgn
DeleteDC
CreateBitmap
GetStockObject
RectVisible
GetTextColor
GetRgnBox
GetMapMode
PtVisible
GetWindowExtEx
GetViewportExtEx
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
GetBkColor
CreatePen
DeleteObject
MoveToEx
LineTo
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
CreateRectRgnIndirect
GetDeviceCaps
CreateCompatibleDC
GetObjectA
TextOutA
msimg32
TransparentBlt
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
OpenPrinterA
advapi32
RegSetValueExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
shell32
SHGetPathFromIDListA
ShellExecuteA
SHBrowseForFolderA
comctl32
InitCommonControlsEx
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoTaskMemAlloc
CoCreateInstance
CoUninitialize
CoInitialize
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
CoTaskMemFree
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
oleaut32
SysAllocString
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
VariantChangeType
SysAllocStringByteLen
SysStringLen
VariantInit
VariantClear
SysAllocStringLen
SysFreeString
ws2_32
WSASocketA
WSACreateEvent
WSASetEvent
WSAEventSelect
WSAConnect
getaddrinfo
WSASend
closesocket
WSACloseEvent
WSAStartup
WSACleanup
freeaddrinfo
WSAGetOverlappedResult
WSAEnumNetworkEvents
WSARecv
WSAResetEvent
WSAGetLastError
unrar
RARSetPassword
RARReadHeaderEx
RARProcessFile
RARCloseArchive
RAROpenArchiveEx
Sections
.text Size: 356KB - Virtual size: 353KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ